Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
skip to main content
10.1145/2487788.2488131acmotherconferencesArticle/Chapter ViewAbstractPublication PageswebconfConference Proceedingsconference-collections
research-article

Defending imitating attacks in web credibility evaluation systems

Published: 13 May 2013 Publication History
  • Get Citation Alerts
  • Abstract

    Unlike traditional media such as television and newspapers, web contents are relatively easy to be published without being rigorously fact-checked. This seriously influences people's daily life if non-credible web contents are utilized for decision making. Recently, web credibility evaluation systems have emerged where web credibility is derived by aggregating ratings from the community (e.g., MyWOT). In this paper, We focus on the robustness of such systems by identifying a new type of attack scenario where an attacker imitates the behavior of trustworthy experts by copying system's credibility ratings to quickly build high reputation and then attack certain web contents. In order to defend this attack, we propose a two-stage defence algorithm. At stage 1, our algorithm applies supervised learning algorithm to predict the credibility of a web content and compare it with a user's rating to estimate whether this user is malicious or not. In case the user's maliciousness can not be determined with high confidence, the algorithm goes to stage 2 where we investigate users' past rating patterns and detect the malicious one by applying hierarchical clustering algorithm. Evaluation using real datasets demonstrates the efficacy of our approach.

    References

    [1]
    How reliable are the ratings? (mywot). http://www.mywot.com/en/faq/website/rating-websites#reliableratings.
    [2]
    R. Burke, B. Mobasher, C. Williams, and R. Bhaumik. Detecting profile injection attacks in collaborative recommender systems. In Proceedings of the The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, 2006.
    [3]
    R. Burke, B. Mobasher, R. Zabicki, and R. Bhaumik. Identifying attack models for secure recommendation. In Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, 2005.
    [4]
    C. Castillo, M. Mendoza, and B. Poblete. Information credibility on twitter. In Proceedings of the 20th WWW, 2011.
    [5]
    B. J. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, N. Fang, J. Paul, A. Rangnekar, J. Shon, P. Swani, and M. Treinen. What makes web sites credible?: a report on a large quantitative study. In Proceedings of the SIGCHI conference on Human factors in computing systems, 2001.
    [6]
    B. J. Fogg and H. Tseng. The elements of computer credibility. In Proceedings of the SIGCHI conference on Human factors in computing systems, 1999.
    [7]
    Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Proceedings of the Thirtieth VLDB - Volume 30, 2004.
    [8]
    C.-F. Hsu, E. Khabiri, and J. Caverlee. Ranking comments on the social web. In Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, 2009.
    [9]
    S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on World Wide Web, 2004.
    [10]
    F. Murtagh. A survey of recent advances in hierarchical clustering algorithms. Computer Journal, 26(4):354--359, 1983.
    [11]
    A. Y. Ng, A. X. Zheng, and M. I. Jordan. Stable algorithms for link analysis. In Proceedings of the 24th SIGIR, 2001.
    [12]
    A. Olteanu, S. Peshterliev, X. Liu, and K. Aberer. Web credibility: Features exploration and credibility prediction. In Proceedings of the 35th ECIR, 2013.
    [13]
    A. Papaioannou, J.-E. Ranvier, A. O., and K. Aberer. A decentralized recommender system for effective web credibility assessment. In Proceedings of the CIKM, 2012.
    [14]
    J. Schwarz and M. Morris. Augmenting web pages and search results to support credibility assessment. In Proceedings of the SIGCHI, 2011.
    [15]
    M. Sharifi, E. Fink, and J. G. Carbonell. Smartnotes: Application of crowdsourcing to the detection of web threats. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2011.
    [16]
    Y. Yamamoto and K. Tanaka. Enhancing credibility judgment of web search results. In Proceedings of the 2011 annual conference on Human factors in computing systems, 2011.
    [17]
    J. Zhang, Y. Kawai, S. Nakajima, Y. Matsumoto, and K. Tanaka. Sentiment bias detection in support of news credibility judgment. In Proceedings of the 44th Hawaii International Conference on System Sciences, 2011.
    [18]
    S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon. Attack detection in time series for recommender systems. In Proceedings of the 12th ACM SIGKDD, 2006.

    Cited By

    View all

    Index Terms

    1. Defending imitating attacks in web credibility evaluation systems

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide Web
        May 2013
        1636 pages
        ISBN:9781450320382
        DOI:10.1145/2487788

        Sponsors

        • NICBR: Nucleo de Informatcao e Coordenacao do Ponto BR
        • CGIBR: Comite Gestor da Internet no Brazil

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 13 May 2013

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. imitating attack
        2. machine learning
        3. robustness
        4. web credibility

        Qualifiers

        • Research-article

        Conference

        WWW '13
        Sponsor:
        • NICBR
        • CGIBR
        WWW '13: 22nd International World Wide Web Conference
        May 13 - 17, 2013
        Rio de Janeiro, Brazil

        Acceptance Rates

        WWW '13 Companion Paper Acceptance Rate 831 of 1,250 submissions, 66%;
        Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)5
        • Downloads (Last 6 weeks)2

        Other Metrics

        Citations

        Cited By

        View all
        • (2019)Reputation-Based Approach Toward Web Content Credibility AnalysisIEEE Access10.1109/ACCESS.2019.29437477(139957-139969)Online publication date: 2019
        • (2019)Behavior Analysis for Electronic Commerce Trading Systems: A SurveyIEEE Access10.1109/ACCESS.2019.29332477(108703-108728)Online publication date: 2019
        • (2019)Credibility in Online Social Networks: A SurveyIEEE Access10.1109/ACCESS.2018.28863147(2828-2855)Online publication date: 2019
        • (2017)Modeling and Evaluating a Robust Feedback-Based Reputation System for E-Commerce PlatformsACM Transactions on the Web10.1145/305726511:3(1-55)Online publication date: 12-Jul-2017
        • (2015)Towards a highly effective and robust Web credibility evaluation systemDecision Support Systems10.1016/j.dss.2015.07.01079:C(99-108)Online publication date: 1-Nov-2015
        • (2014)Hybrid Algorithm for Precise Recommendation from Almost Infinite Set of WebsitesProceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 0110.1109/WI-IAT.2014.50(318-322)Online publication date: 11-Aug-2014

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media