SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Detecting Bad Mouthing Behavior in Reputation Systems
                                        Kuan-Ta Chen (Chun-Yang Chen) , Cheng-Chun Lou , Polly Huang , and Ling-Jyh Chen
                                                                                                                     1                                                            2                             2                                           1
                                                                          1
                                                                              Academia Sinica, 2National Taiwan University
Background                                                                Hypothesis                                                                                                                                Votee-Voter-based Collusion Cluster Detection
• MMORPGs (Massively Multiplayer Online Role-Playing Games)               • The most voters of legitimate players are likely collusion cluster                                                                      The relationship of victim group is stronger than random votee cluster
  have become extremely popular                                           • In case if a collusion cluster attacks for several times
                                                                                                                                                                                                                    First take the votees with more common voters
                                                                              1. Collusion Cluster has more common votees than random
                                                                                                                                                                                                                         • form the victim group
• Game bots                                                                      voter cluster
   ○ Auto-playing game clients                                                2. Victims have more common voters than random votee cluster                                                                          Then take union of the voters of the victim group
   ○ One of the greatest threats of MMORPGs                                                                                                                                                                            • form the collusion cluster candidate
                                                                          • Based-on                                                                                                                                Apply Voter-based Collusion Cluster Detection
• Detection of Game Bots                                                      ○ The voters & votees id of each player
   ○ Manual detection (game master) [1]                                   • Note
   ○ Traffic analysis approach [2]                                            ○ When not attack, a collusive player acts as a legitimate player                                                                     Performance Evaluation Results
   ○ Voting-based system [3]                                                                                                                                                                                                                        Voter-Based      Votee-Voter-Based        Comparison
       - Each player votes the suspicious player as a game bot            Voter-Based Collusion Cluster Detection                                                                                                    # of Attack
                                                                                                                                                                                                                     (Single CC or Multiple CC)
                                                                                                                                                                                                                                                    More attacks  higher accuracy       Votee-Voter > Voter

                                                                          The relationship of collusion cluster is stronger than random voter cluster                                                                                              No influence     Need more than 3
Motivation                                                                Take the voters with more common votees between each other
                                                                                                                                                                                                                     Collusion Cluster Size
                                                                                                                                                                                                                                                  high accuracy     high accuracy
                                                                                                                                                                                                                                                                                         Voter > Votee-Voter

                                                                                                                                                                                                                     Prob. of Collusive Player
                                                                             • form the collusion cluster.                                                                                                           Attack Vote
                                                                                                                                                                                                                                                    Higher Prob.  higher accuracy       Votee-Voter > Voter
• Problem in voting-based system
  General Case                         Malicious Case                                          3                                                                                  ID   Votee List
                                                                                                                                           4
                                                                                                                                                                            1     1    11, 12, 13, 14, 17           Voter-Based scheme:
                                                                                                                                                           5
                                                                                                        4                    2
                                                                                                                                                                                  2    11, 12, 13, 14, 15, 18       Robust to the size of collusion cluster
                                                                                  1                                              4                                                3    9, 13, 14, 15
                                                                                                        4                3                     3
                                                                                                                                                                                  4    11, 12, 13, 14               Voter-Votee-Based scheme:
                  BOT




                                                          BOT




                                                                                                                                                                    1                                               Robust to the number of attacks
         BO
                        BO
                                               BO
                                                                 BO                            2                                      4                                 1         5    12, 13, 14, 15, 25, 60
                                                                           1
                          T                                         T
           T                                      T
                                                                                                                             2                                 1                  9    17, 25, 30

        BO T                                   B OT
                                                                                      1
                                                                                                            3
                                                                                                                                           3
                                                                                                                                                                   18
                                                                                                                                                                                  10   17, 18, 50, 56               Conclusion
                                                                              10                                                                                                  11   17, 18, 70, 44               • Two mechanisms to detect the collusion cluster
                 BOT                                     User
                                                                                                                     1                     1
                                                                                                                                                                                  12   17, 20, 35                       ○ Based on the voting history
                                                                                                                                                       1
• Collusion                                                                                                                      13
                                                                                                                                                                                  13   40, 45, 50                       ○ Single cluster or multiple clusters
                                                                                                                1                                                                 14   55, 80, 90
   ○ A secret agreement between two or more parties for a fraudulent,
                                                                                          17
                                                                                                                                                            9
                                                                                                                                 1
      illegal, or deceitful purpose [4]                                                                     1                                  1
                                                                                                                                                                                  15   20, 30, 40                   • Accuracy
         - Unfairly low ratings – bad mouthing
                                                                                                   14
                                                                                                                                                   1        1
                                                                                                                                                                                  17   1                                ○ Attack more than three times: 83%+
                                                                                      1
         - Unfairly high ratings – ballot stuffing                                                                                                                                18   17, 60                           ○ Attack more than five times: 97%+
                                                                                                                                      15       1       12
                                                                                                                11                                                          Weight (A, B): # of common
• Only can vote negatively (game bot)                                         1                                                                                             votees of A and B                       • Adjust other experimental factors
                                                                                                                                                                                                                       ○ Only collusion cluster size and prob. of collusive player attack vote
   ○ This study focuses on bad-mouthing                 attacks           < Algorithm >
                                                                                                                                                                                                                         have the obvious influence to the accuracy
                                                                          while ( edge(G ) ∉ Φ )
Problem Formulation                                                         Take the edge with the largest weight

• Bad-Mouthing
                                                                            while (not termination condition )                                                                                                      Furture Work
                                                                                Take the outlier edge with the largest weight                                                                                       Detecting players who participate in multiple collusion clusters
    ○ A malicious group deliberately vote a legitimate player as a          end while
      game bot                                                              output                                                                                                                                  [1] I. MacInnes and L. Hu, “Business models and operational issues in the chinese online game
• Terms                                                                   end while                                                                                                                                 industry,” Telematics and Informatics, vol. 24, no. 2, pp. 130-144, 2007
    ○ Collusion Cluster: a bad-mouthing group                                                                                                                                                                       [2] K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen, “Identifying mmor-
                                                                          Terminal Condition:
    ○ Victim: the legitimate players who are under bad-mouthing attacks   ∑{weight (u,v) | u, v ⊂ S ' } − ∑{weight (u,v) | u, v ⊂ S} < a                                                                            pg bots: A traffic analysis approach,” in Proceedings of ACM SIGCHI ACE, 2006
• Goal                                                                                                                       S                                                                                      [3] Blizzard, http://www.blizzard.com/war3/
   To Detect the Collusion Clusters                                                                                                                                                                                 [4] http://www.answers.com/collusion?cat=biz-fin

Weitere ähnliche Inhalte

Mehr von Academia Sinica

Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingAcademia Sinica
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkAcademia Sinica
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsAcademia Sinica
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemAcademia Sinica
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAcademia Sinica
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game AddictivenessAcademia Sinica
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesAcademia Sinica
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficAcademia Sinica
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryAcademia Sinica
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessAcademia Sinica
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionAcademia Sinica
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionAcademia Sinica
 
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterMitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterAcademia Sinica
 
An Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game HoursAn Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game HoursAcademia Sinica
 
Game Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveGame Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveAcademia Sinica
 
An Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP GamesAn Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP GamesAcademia Sinica
 
The Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesThe Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesAcademia Sinica
 
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAutomatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAcademia Sinica
 
Game Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold LearningGame Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold LearningAcademia Sinica
 

Mehr von Academia Sinica (20)

Understanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client GamingUnderstanding The Performance of Thin-Client Gaming
Understanding The Performance of Thin-Client Gaming
 
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkQuantifying QoS Requirements of Network Services: A Cheat-Proof Framework
Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework
 
Online Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired ComparisonsOnline Game QoE Evaluation using Paired Comparisons
Online Game QoE Evaluation using Paired Comparisons
 
GamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming SystemGamingAnywhere: An Open Cloud Gaming System
GamingAnywhere: An Open Cloud Gaming System
 
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachAre All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach
 
Forecasting Online Game Addictiveness
Forecasting Online Game AddictivenessForecasting Online Game Addictiveness
Forecasting Online Game Addictiveness
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay NodesToward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
 
Inferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype TrafficInferring Speech Activity from Encrypted Skype Traffic
Inferring Speech Activity from Encrypted Skype Traffic
 
Game Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar TrajectoryGame Bot Detection Based on Avatar Trajectory
Game Bot Detection Based on Avatar Trajectory
 
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user TrustinessImproving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
Improving Reliability of Web 2.0-based Rating Systems Using Per-user Trustiness
 
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User SatisfactionTuning Skype’s Redundancy Control Algorithm for User Satisfaction
Tuning Skype’s Redundancy Control Algorithm for User Satisfaction
 
Network Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player InteractionNetwork Game Design: Hints and Implications of Player Interaction
Network Game Design: Hints and Implications of Player Interaction
 
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterMitigating Active Attacks Towards Client Networks Using the Bitmap Filter
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
 
An Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game HoursAn Analysis of WoW Players’ Game Hours
An Analysis of WoW Players’ Game Hours
 
Game Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveGame Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG Perspective
 
An Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP GamesAn Analytical Approach to Optimizing The Utility of ESP Games
An Analytical Approach to Optimizing The Utility of ESP Games
 
The Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking SchemesThe Impact of Network Variabilities on TCP Clocking Schemes
The Impact of Network Variabilities on TCP Clocking Schemes
 
Automatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of WarcraftAutomatic Storytelling in Comics: A Case Study on World of Warcraft
Automatic Storytelling in Comics: A Case Study on World of Warcraft
 
Game Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold LearningGame Bot Identification Based on Manifold Learning
Game Bot Identification Based on Manifold Learning
 

Kürzlich hochgeladen

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Detecting Bad Mouthing Behavior in Reputation Systems

  • 1. Detecting Bad Mouthing Behavior in Reputation Systems Kuan-Ta Chen (Chun-Yang Chen) , Cheng-Chun Lou , Polly Huang , and Ling-Jyh Chen 1 2 2 1 1 Academia Sinica, 2National Taiwan University Background Hypothesis Votee-Voter-based Collusion Cluster Detection • MMORPGs (Massively Multiplayer Online Role-Playing Games) • The most voters of legitimate players are likely collusion cluster The relationship of victim group is stronger than random votee cluster have become extremely popular • In case if a collusion cluster attacks for several times First take the votees with more common voters 1. Collusion Cluster has more common votees than random • form the victim group • Game bots voter cluster ○ Auto-playing game clients 2. Victims have more common voters than random votee cluster Then take union of the voters of the victim group ○ One of the greatest threats of MMORPGs • form the collusion cluster candidate • Based-on Apply Voter-based Collusion Cluster Detection • Detection of Game Bots ○ The voters & votees id of each player ○ Manual detection (game master) [1] • Note ○ Traffic analysis approach [2] ○ When not attack, a collusive player acts as a legitimate player Performance Evaluation Results ○ Voting-based system [3] Voter-Based Votee-Voter-Based Comparison - Each player votes the suspicious player as a game bot Voter-Based Collusion Cluster Detection # of Attack (Single CC or Multiple CC) More attacks  higher accuracy Votee-Voter > Voter The relationship of collusion cluster is stronger than random voter cluster No influence Need more than 3 Motivation Take the voters with more common votees between each other Collusion Cluster Size high accuracy high accuracy Voter > Votee-Voter Prob. of Collusive Player • form the collusion cluster. Attack Vote Higher Prob.  higher accuracy Votee-Voter > Voter • Problem in voting-based system General Case Malicious Case 3 ID Votee List 4 1 1 11, 12, 13, 14, 17 Voter-Based scheme: 5 4 2 2 11, 12, 13, 14, 15, 18 Robust to the size of collusion cluster 1 4 3 9, 13, 14, 15 4 3 3 4 11, 12, 13, 14 Voter-Votee-Based scheme: BOT BOT 1 Robust to the number of attacks BO BO BO BO 2 4 1 5 12, 13, 14, 15, 25, 60 1 T T T T 2 1 9 17, 25, 30 BO T B OT 1 3 3 18 10 17, 18, 50, 56 Conclusion 10 11 17, 18, 70, 44 • Two mechanisms to detect the collusion cluster BOT User 1 1 12 17, 20, 35 ○ Based on the voting history 1 • Collusion 13 13 40, 45, 50 ○ Single cluster or multiple clusters 1 14 55, 80, 90 ○ A secret agreement between two or more parties for a fraudulent, 17 9 1 illegal, or deceitful purpose [4] 1 1 15 20, 30, 40 • Accuracy - Unfairly low ratings – bad mouthing 14 1 1 17 1 ○ Attack more than three times: 83%+ 1 - Unfairly high ratings – ballot stuffing 18 17, 60 ○ Attack more than five times: 97%+ 15 1 12 11 Weight (A, B): # of common • Only can vote negatively (game bot) 1 votees of A and B • Adjust other experimental factors ○ Only collusion cluster size and prob. of collusive player attack vote ○ This study focuses on bad-mouthing attacks < Algorithm > have the obvious influence to the accuracy while ( edge(G ) ∉ Φ ) Problem Formulation Take the edge with the largest weight • Bad-Mouthing while (not termination condition ) Furture Work Take the outlier edge with the largest weight Detecting players who participate in multiple collusion clusters ○ A malicious group deliberately vote a legitimate player as a end while game bot output [1] I. MacInnes and L. Hu, “Business models and operational issues in the chinese online game • Terms end while industry,” Telematics and Informatics, vol. 24, no. 2, pp. 130-144, 2007 ○ Collusion Cluster: a bad-mouthing group [2] K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen, “Identifying mmor- Terminal Condition: ○ Victim: the legitimate players who are under bad-mouthing attacks ∑{weight (u,v) | u, v ⊂ S ' } − ∑{weight (u,v) | u, v ⊂ S} < a pg bots: A traffic analysis approach,” in Proceedings of ACM SIGCHI ACE, 2006 • Goal S [3] Blizzard, http://www.blizzard.com/war3/ To Detect the Collusion Clusters [4] http://www.answers.com/collusion?cat=biz-fin