Defending imitating attacks in web credibility evaluation systems

Unlike traditional media such as television and newspapers, web contents are relatively easy to be published without being rigorously fact-checked. This seriously influences people's daily life if non-credible web contents are utilized for decision making. Recently, web credibility evaluation systems have emerged where web credibility is derived by aggregating ratings from the community (e.g., MyWOT). In this paper, We focus on the robustness of such systems by identifying a new type of attack scenario where an attacker imitates the behavior of trustworthy experts by copying system's credibility ratings to quickly build high reputation and then attack certain web contents. In order to defend this attack, we propose a two-stage defence algorithm. At stage 1, our algorithm applies supervised learning algorithm to predict the credibility of a web content and compare it with a user's rating to estimate whether this user is malicious or not. In case the user's maliciousness can not be determined with high confidence, the algorithm goes to stage 2 where we investigate users' past rating patterns and detect the malicious one by applying hierarchical clustering algorithm. Evaluation using real datasets demonstrates the efficacy of our approach.

[1]  James Caverlee,et al.  Ranking Comments on the Social Web , 2009, 2009 International Conference on Computational Science and Engineering.

[2]  Karl Aberer,et al.  Web Credibility: Features Exploration and Credibility Prediction , 2013, ECIR.

[3]  Robin Burke,et al.  Identifying Attack Models for Secure Recommendation , 2004 .

[4]  Michael I. Jordan,et al.  Stable algorithms for link analysis , 2001, SIGIR '01.

[5]  Bamshad Mobasher,et al.  Detecting Profile Injection Attacks in Collaborative Recommender Systems , 2006, The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services (CEC/EEE'06).

[6]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[7]  Shinsuke Nakajima,et al.  Sentiment Bias Detection in Support of News Credibility Judgment , 2011, 2011 44th Hawaii International Conference on System Sciences.

[8]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[9]  Eugene Fink,et al.  SmartNotes: Application of crowdsourcing to the detection of web threats , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[10]  Katsumi Tanaka,et al.  Enhancing credibility judgment of web search results , 2011, CHI.

[11]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[12]  Karl Aberer,et al.  A decentralized recommender system for effective web credibility assessment , 2012, CIKM '12.

[13]  Fillia Makedon,et al.  Attack detection in time series for recommender systems , 2006, KDD '06.

[14]  Barbara Poblete,et al.  Information credibility on twitter , 2011, WWW.

[15]  Meredith Ringel Morris,et al.  Augmenting web pages and search results to support credibility assessment , 2011, CHI.

[16]  B. J. Fogg,et al.  What makes Web sites credible?: a report on a large quantitative study , 2001, CHI.

[17]  Fionn Murtagh,et al.  A Survey of Recent Advances in Hierarchical Clustering Algorithms , 1983, Comput. J..