Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Suspicious Behavior Detection: Current Trends and Future Directions

Published: 01 January 2016 Publication History

Abstract

Different real-world applications have varying definitions of suspicious behaviors. Detection methods often look for the most suspicious parts of the data by optimizing scores, but quantifying the suspiciousness of a behavioral pattern is still an open issue.

References

[1]
C. Xu et al., “An Adaptive Fusion Algorithm for Spam Detection,” IEEE Intelligent Systems, vol. 29, no. 4, 2014, pp. 2–8.
[2]
J. Ratkiewicz et al., “Detecting and Tracking Political Abuse in Social Media,” in Proc. 5th Int'l AAAI Conf. Weblogs and Social Media, 2011; [Online]. Available: www.aaai.org/ocs/index.php/ICWSM/IC-WSM11/paper/view/2850.
[3]
K. Lee, J. Caverlee, and S. Webb, “Uncovering Social Spammers: Social Honeypots + Machine Learning,” in Proc. 33rd Int'l ACM SIGIR Conf. Research and Development in Information Retrieval, 2010, pp. 435–442.
[4]
P.-A. Chirita, J. Diederich, and W. Nejdl, “Mailrank: Using Ranking for Spam Detection,” in Proc. 14th ACM Int'l Conf. Information and Knowledge Management, 2005, pp. 373–380.
[5]
H. Yu et al., “Sybillimit: A Near-Optimal Social Network Defense against Sybil Attacks,” IEEE/ACM Trans. Networking, vol. 18, no. 3, 2010, pp. 885–898.
[6]
J. Ratkiewicz et al., “Truthy: Mapping the Spread of Astroturf in Microblog Streams,” in Proc. 20th Int'l Conf. Comp. World Wide Web, 2011, pp. 249–252.
[7]
L. Akoglu, M. McGlohon, and C. Faloutsos, “Oddball: Spotting Anomalies in Weighted Graphs,” Advances in Knowledge Discovery and Data Mining, LNCS 6119, Springer, 2010, pp. 410–421.
[8]
Q. Xu et al., “SMS Spam Detection Using Noncontent Features,” IEEE Intelligent Systems, vol. 27, no. 6, 2012, pp. 44–51.
[9]
A. Beutel et al., “Copycatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks,” in Proc. 22nd Int'l Conf. World Wide Web, 2013, pp. 119–130.
[10]
X. Hu et al., “Social Spammer Detection in Microblogging,” in Proc. 23rd Int'l Joint Conf. Artificial Intelligence, 2013, pp. 2633–2639.
[11]
Q. Cao et al., “Aiding the Detection of Fake Accounts in Large Scale Social Online Services,” in Proc. 9th Usenix Conf. Networked Systems Design and Implementation, 2012, pp. 15–28.
[12]
S. Ghosh et al., “Understanding and Combating Link Farming in the Twitter Social Network,” in Proc. 21st Int'l Conf. World Wide Web, 2012, pp. 61–70.
[13]
A. Mukherjee et al., “Spotting Opinion Spammers Using Behavioral Footprints,” in Proc. 19th ACM SIGKDD lnt'l Conf. Knowledge Discovery and Data Mining, 2013, pp. 632–640.
[14]
A. Mukherjee, B. Liu, and N. Glance, “Spotting Fake Reviewer Groups in Consumer Reviews,” in Proc. 21st Int'l Conf. World Wide Web, 2012, pp. 191–200.
[15]
N. Jindal and B. Liu, “Opinion Spam and Analysis,” in Proc. 1st lnt'l Conf. Web Search and Data Mining, 2008, pp. 219–230.
[16]
E.-P. Lim et al., “Detecting Product Review Spammers Using Rating Behaviors,” in Proc. 19th ACM Int'l Conf. Information and Knowledge Management, 2010, pp. 939–948.
[17]
F. Benevenuto et al., “Detecting Spammers on Twitter,” in Proc. Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf., vol. 6, 2010, p. 12.
[18]
H. Gao et al., “Detecting and Characterizing Social Spam Campaigns,” in Proc. 10th ACM SIGCOMM Conf. Internet Measurement, 2010, pp. 35–47.
[19]
L. Akoglu, R. Chandy, and C. Faloutsos, “Opinion Fraud Detection in Online Reviews by Network Effects,” in Proc. Int'l Conf. Web and Social Media, 2013; [Online]. Available: www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/viewFile/5981/6338.
[20]
M. Araujo et al., “Com2: Fast Automatic Discovery of Temporal (‘Comet’) Communities,” Advances in Knowledge Discovery and Data Mining, LNCS 8444, Springer, 2014, pp. 271–283.
[21]
M. Jiang et al., “Inferring Strange Behavior from Connectivity Pattern in Social Networks,” Advances in Knowledge Discovery and Data Mining, LNCS 8443, Springer, 2014, pp. 126–138.
[22]
G. Fei et al., “Exploiting Burstiness in Reviews for Review Spammer Detection,” in Proc. 7th Int'l AAAI Conf. Weblogs and Social Media, 2013; [Online]. Available: www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/viewFile/6069/6356.
[23]
M. Jiang et al., “Catchsync: Catching Synchronized Behavior in Large Directed Graphs,” in Proc. 20th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, 2014, pp. 941–950.
[24]
X. Hu et al., “Social Spammer Detection with Sentiment Information,” Proc. Int'l Conf. Data Mining, 2014, pp. 180–189.
[25]
X. Hu, J. Tang, and H. Liu, “Online Social Spammer Detection,” in Proc. 28th AAAI Conf. Artificial Intelligence, 2014; [Online]. Available: www.aaai.org/ocs/index.php/AAAI/AAA114/paper/viewFile/8467/8399.
[26]
M. Jiang et al., “FEMA: Flexible Evolutionary Multi-Faceted Analysis for Dynamic Behavioral Pattern Discovery,” in Proc. 20th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, 2014, pp. 1186–1195.
[27]
M. Jiang et al., “A General Suspiciousness Metric for Dense Blocks in Multi-Modal Data,” to be published in Proc. IEEE Int'l Conf. Data Mining, 2015; [Online]. Available: www.meng-jiang.com/pubs/crossspoticdm15/crossspot-icdm15-paper.pdf.

Cited By

View all
  • (2024)Improving the accuracy of Anomaly Detection in Multimodal Sensors using 1D-CNNProceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments10.1145/3652037.3652052(212-221)Online publication date: 26-Jun-2024
  • (2023)Swinging in the States: Does disinformation on Twitter mirror the US presidential election system?Companion Proceedings of the ACM Web Conference 202310.1145/3543873.3587638(1395-1403)Online publication date: 30-Apr-2023
  • (2022)Collusive anomalies detection based on collaborative markov random fieldIntelligent Data Analysis10.3233/IDA-21628726:6(1469-1485)Online publication date: 1-Jan-2022
  • Show More Cited By

Index Terms

  1. Suspicious Behavior Detection: Current Trends and Future Directions
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Intelligent Systems
          IEEE Intelligent Systems  Volume 31, Issue 1
          Jan.-Feb. 2016
          98 pages

          Publisher

          IEEE Educational Activities Department

          United States

          Publication History

          Published: 01 January 2016

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 01 Sep 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Improving the accuracy of Anomaly Detection in Multimodal Sensors using 1D-CNNProceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments10.1145/3652037.3652052(212-221)Online publication date: 26-Jun-2024
          • (2023)Swinging in the States: Does disinformation on Twitter mirror the US presidential election system?Companion Proceedings of the ACM Web Conference 202310.1145/3543873.3587638(1395-1403)Online publication date: 30-Apr-2023
          • (2022)Collusive anomalies detection based on collaborative markov random fieldIntelligent Data Analysis10.3233/IDA-21628726:6(1469-1485)Online publication date: 1-Jan-2022
          • (2022)A Deep Learning-Based Model for Analyzing Social Public IssuesSecurity and Communication Networks10.1155/2022/73996002022Online publication date: 1-Jan-2022
          • (2022)Traditional and context-specific spam detection in low resource settingsMachine Language10.1007/s10994-022-06176-x111:7(2515-2536)Online publication date: 1-Jul-2022
          • (2022)Artificial Intelligence and Reduced SMEs’ Business Risks. A Dynamic Capabilities Analysis During the COVID-19 PandemicInformation Systems Frontiers10.1007/s10796-022-10249-624:4(1223-1247)Online publication date: 1-Aug-2022
          • (2021)Zombie Follower Recognition Based on Industrial Chain Feature AnalysisSecurity and Communication Networks10.1155/2021/66564702021Online publication date: 1-Jan-2021
          • (2021)A Survey on Data-driven Network Intrusion DetectionACM Computing Surveys10.1145/347275354:9(1-36)Online publication date: 8-Oct-2021
          • (2020)STARSACM Transactions on Intelligent Systems and Technology10.1145/339746311:5(1-25)Online publication date: 24-Jul-2020
          • (2019)User Behavior Modelling for Fake Information Mitigation on Social WebSocial, Cultural, and Behavioral Modeling10.1007/978-3-030-21741-9_24(234-244)Online publication date: 9-Jul-2019
          • Show More Cited By

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media