Web Technologies and Applications

In our daily life, fake reviews to restaurants on e-commerce website have some great affects to the choice of consumers. By categorizing the set of fake reviews, we have found that fake reviews from hype make up the largest part, and this type of review always mislead consumers. This article analyzed all the characteristics of fake reviews of hype and find that the text of the review always tells us the truth. For the reason that hype review is always absolute positive or negative, we proposed an algorithm to detect online fake reviews of hype about restaurants based on sentiment analysis. In our experiment, reviews are considered in four dimensions: taste, environment, service and overall attitude. If the analysis result of the four dimensions is consistent, the review will be categorized as a hype review. Our experiment results have shown that the accuracy of our algorithm is about 74% and the method proposed in this article can also be applied to other areas, such as sentiment analysis of online opinion in emergency management of emergency cases.

[1]  Minas Gjoka,et al.  BotTorrent: Misusing BitTorrent to Launch DDoS Attacks , 2007, SRUTI.

[2]  P. Asha,et al.  An assortment of spam detection system , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[3]  José María Gómez Hidalgo,et al.  Content based SMS spam filtering , 2006, DocEng '06.

[4]  Shih-Kun Huang,et al.  Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.

[5]  Ping Wang,et al.  An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.

[6]  Jonathan Lemon,et al.  Resisting SYN Flood DoS Attacks with a SYN Cache , 2002, BSDCon.

[7]  Harald Baier,et al.  Performance Issues About Context-Triggered Piecewise Hashing , 2011, ICDF2C.

[8]  Hector Garcia-Molina,et al.  Web Spam Taxonomy , 2005, AIRWeb.

[9]  Geoffrey Zweig,et al.  Syntactic Clustering of the Web , 1997, Comput. Networks.

[10]  Nazanin Firoozeh,et al.  Definition of spam 2.0: New spamming boom , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[11]  Taoufik En-Najjary,et al.  Exploiting KAD: possible uses and misuses , 2007, CCRV.

[12]  Ruben Torres,et al.  DDoS Attacks by Subverting Membership Management in P2P Systems , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.

[13]  Qiang Yang,et al.  SMS Spam Detection Using Noncontent Features , 2012, IEEE Intelligent Systems.

[14]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Jesse D. Kornblum Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..

[16]  Guo Hao-ran IPv6 attack source traceback scheme based on extension header probabilistic marking , 2010 .

[17]  Gang Xiong,et al.  A research on the vulnerability in popular P2P protocols , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).

[18]  Sun Zhi Enhancing the Ability of Inter-Domain IP Spoofing Prevention , 2010 .

[19]  Xiaohong Yuan,et al.  A Visualization based Simulator for SYN Flood Attacks , 2018, IMAGAPP/IVAPP.

[20]  Joshua Alspector,et al.  Improved robustness of signature-based near-replica detection via lexicon randomization , 2004, KDD.

[21]  Zhoujun Li,et al.  Misusing Kademlia Protocol to Perform DDoS Attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[22]  Wang Chun-li Anti-spam technology review , 2008 .

[23]  Simson L. Garfinkel VoIP and Skype Security , 2005 .

[24]  Brian Whitworth,et al.  Spam and the social-technical gap , 2004, Computer.

[25]  QUTdN QeO,et al.  Random early detection gateways for congestion avoidance , 1993, TNET.

[26]  Evangelos P. Markatos,et al.  Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets , 2006, ACNS.

[27]  Weifeng Chen,et al.  RRED: robust RED algorithm to counter low-rate denial-of-service attacks , 2010, IEEE Communications Letters.

[28]  Li Yu-hua Data Chunking Algorithm Based on Byte-fingerprint Extremum Characteristics , 2010 .

[29]  Ion Androutsopoulos,et al.  Adaptive Spam Filtering Using Only Naive Bayes Text Classifiers , 2008 .

[30]  Kang Li,et al.  Speed Up Statistical Spam Filter by Approximation , 2011, IEEE Transactions on Computers.

[31]  Lin Chen Email Remove-duplicate Algorithm Based on SHA-1 , 2008 .

[32]  Fernando Gont,et al.  Defending Against Sequence Number Attacks , 1996, RFC.

[33]  George Neville-Neil,et al.  Deprecation of Type 0 Routing Headers in IPv6 , 2007, RFC.

[34]  Vern Paxson,et al.  An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.

[35]  Jia Wang,et al.  The taming of the shrew: mitigating low-rate TCP-targeted attack , 2010, IEEE Trans. Netw. Serv. Manag..

[36]  Panagiotis Papadopoulos,et al.  Strengthening Consistency in the Cassandra Distributed Key-Value Store , 2013, DAIS.

[37]  Abdur Chowdhury,et al.  Lexicon randomization for near-duplicate detection with I-Match , 2007, The Journal of Supercomputing.

[38]  Keith W. Ross,et al.  Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.

[39]  Ka Cheung Sia DDoS Vulnerability Analysis of Bittorrent Protocol , 2006 .

[40]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.