Filters








2,419 Hits in 5.2 sec

A behavior observation tool (BOT) for mobile device network connection logs

Ting Wang
2014 Proceedings of the 23rd International Conference on World Wide Web - WWW '14 Companion  
In order to observe user behavior from this kind of data set, we propose a new algorithm, namely Behavior Observation Tool (BOT), which uses Convex Hull Algorithm with sliding time windows to model the  ...  In this work, we aim to use one specific type of locational data -network connection logs of mobile devices, which is widely available and easily accessible to telecom companies, to identify and extract  ...  To deal with the drawbacks of mobile device network logs, we propose a new algorithm in this paper, namely Behavior Observation Tool (BOT).  ... 
doi:10.1145/2567948.2580069 dblp:conf/www/Wang14 fatcat:72igsfwquve67bd2fkmvw3kb7a

BeCAPTCHA: Behavioral Bot Detection using Touchscreen and Mobile Sensors benchmarked on HuMIdb [article]

Alejandro Acien and Aythami Morales and Julian Fierrez and Ruben Vera-Rodriguez and Oscar Delgado-Mohatar
2020 arXiv   pre-print
Our results suggest the potential of mobile sensors to characterize the human behavior and develop a new generation of CAPTCHAs.  ...  The goal of BeCAPTCHA is to determine whether the drag and drop task was realized by a human or a bot.  ...  According to [16] , these mobile bots use cellular networks by connecting through cellular gateways. Mobile bots can perform highly advanced attacks while remaining hidden in plain sight.  ... 
arXiv:2005.13655v2 fatcat:z7ch5rxn2zevzpimsalmo4vrv4

Web Runner 2049: Evaluating Third-Party Anti-bot Services [chapter]

Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis
2020 Lecture Notes in Computer Science  
well-known automation tools and popular browsers.  ...  We analyze the JavaScript code which their clients need to include in their websites and perform a set of gray box and black box analyses of their proprietary back-end logic, by simulating bots utilizing  ...  We thank the anonymous reviewers for their helpful feedback.  ... 
doi:10.1007/978-3-030-52683-2_7 fatcat:mx47co33zvfyhchram4knsskta

BeCAPTCHA-Mouse: Synthetic Mouse Trajectories and Improved Bot Detection [article]

Alejandro Acien and Aythami Morales and Julian Fierrez and Ruben Vera-Rodriguez
2021 arXiv   pre-print
We then present BeCAPTCHA-Mouse, a bot detector based on: i) a neuromotor model of mouse dynamics to obtain a novel feature set for the classification of human and bot samples; and ii) a learning framework  ...  Networks (GANs) in which a Generator synthesizes human-like trajectories from a Gaussian noise input.  ...  tool to complement traditional CAPTCHA systems.  ... 
arXiv:2005.00890v2 fatcat:bytflah6lvbmlc5zhahcfcdrlu

Honest vs Cheating Bots in PATROL-Based Real-Time Strategy MMOGs [chapter]

Stefano Sebastio, Michele Amoretti, Jose Raul Murga, Marco Picone, Stefano Cagnoni
2014 Evolution, Complexity and Artificial Life  
In particular, we show how honest bots can detect cheating bots in real-time, thanks to strategies based on neural networks.  ...  To support the implementation of ultra-scalable real-time strategy MMOGs, we are developing a middleware, called PATROL, that is based on a structured peer-to-peer overlay scheme.  ...  In our previous work [1] we focused on the module for peer-to-peer connectivity and communication, and on the module for detecting cheating behaviors.  ... 
doi:10.1007/978-3-642-37577-4_15 fatcat:bwhopidakjcjhja6xt6ak2mfni

SpiderTrap - an Innovative Approach to Analyze Activity of Internet Bots on a Website

Piotr Lewandowski, Marek Janiszewski, Anna Felkner
2020 IEEE Access  
This information can be used to optimize the websites for search engines' bots for a better place on a search's results page or prepare a set of rules for tools that filter traffic to the web pages to  ...  for active webshells (i.e. access points to control a web server left by other attackers).  ...  Microsoft crawls websites with two different types of bots -standard and a mobile. The mobile Bingbot presents itself as an iPhone. List of User-Agent strings logged by the honeypot: addresses.  ... 
doi:10.1109/access.2020.3012969 fatcat:pjnfk2d7szfgtbphxaleopggs4

Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset [article]

Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull
2018 arXiv   pre-print
This paper, proposes a new dataset, Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks.  ...  This work provides the baseline for allowing botnet identificaiton across IoT-specifc networks. The Bot-IoT dataset can be accessed at [1].  ...  Simulated IoT services In order to simulate the network behavior of IoT devices, we employed the Node-red tool [39] .  ... 
arXiv:1811.00701v1 fatcat:laosteezdjgvrdg4ctrr25u2he

Measuring Social Spam and the Effect of Bots on Information Diffusion in Social Media [chapter]

Emilio Ferrara
2018 Computational Social Sciences  
Bots have been playing a crucial role in online platform ecosystems, as efficient and automatic tools to generate content and diffuse information to the social media human population.  ...  of bots behind the diffusion dynamics of social media spam campaigns.  ...  Crowd-sourcing social bot detection Some authors suggested crowd-sourcing social bot detection, assuming that it would be a simple task for humans to evaluate an account's behavior and to observe emerging  ... 
doi:10.1007/978-3-319-77332-2_13 fatcat:jmlyzcvdoffezjh5wlulfnceji

People are Strange when you're a Stranger: Impact and Influence of Bots on Social Networks [article]

Luca Maria Aiello, Martina Deplano, Rossano Schifanella, Giancarlo Ruffo
2014 arXiv   pre-print
Nevertheless, crawlers and software agents are a precious tool for analysts, and they are continuously executed to collect data or to test distributed applications.  ...  However, no one knows which is the real potential of a bot whose purpose is to control a community, to manipulate consensus, or to influence user behavior.  ...  We are grateful to aNobii for making its data available, to Giuseppe Tipaldo, Alain Barrat, Ciro Cattuto and to the members of the NaN group at Indiana University for helpful discussions.  ... 
arXiv:1407.8134v1 fatcat:wwuk5qu66jh7vkmoy6pkzzru4u

Detecting Social Media Bots with Variational AutoEncoder and k-Nearest Neighbor

Xiujuan Wang, Qianqian Zheng, Kangfeng Zheng, Yi Sui, Siwei Cao, Yutong Shi
2021 Applied Sciences  
Efficient and reliable classification of social media bots is crucial for detecting information manipulation in social networks.  ...  Malicious social media bots are disseminators of malicious information on social networks and seriously affect information security and the network environment.  ...  According to the 2020 bad bot report released by Distil Networks, malicious social media bots accounted for 24.1% of total network traffic in 2019, and almost a quarter of total network traffic.  ... 
doi:10.3390/app11125482 fatcat:hvrlprs2pvg4xedruxfo3igwla

Broker Bots: Analyzing automated activity during High Impact Events on Twitter [article]

Sudip Mittal, Ponnurangam Kumaraguru
2014 arXiv   pre-print
We identify bots in high impact events for 2013: Boston blasts, February 2014 US Icestorm, Washington Navy Yard Shooting, Oklahoma tornado, and Cyclone Phailin.  ...  Using standard machine learning, we proposed a methodology to identify bots/non bots in real time during high impact events.  ...  I would also like to thank Aditi Gupta and Paridhi Jain for their feedback and support. Last and not the least, I really appreciate and thank "PK" for being an awesome advisor and mentor.  ... 
arXiv:1406.4286v1 fatcat:vcozzt5qezgplpqf4zy4z3tedi

LOBO -- Evaluation of Generalization Deficiencies in Twitter Bot Classifiers [article]

Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou
2018 arXiv   pre-print
In this paper, we motivate the need for a generalized evaluation in Twitter bot detection and propose a methodology to evaluate bot classifiers by testing them on unseen bot classes.  ...  Botnets in online social networks are increasingly often affecting the regular flow of discussion, attacking regular users and their posts, spamming them with irrelevant or offensive content, and even  ...  Dataset E consists of spammers of paid apps for mobile devices. Finally, dataset G is made of spammers of products on sale at Amazon.com. Honeypot bots.  ... 
arXiv:1809.09684v1 fatcat:bc2enhctszhwbcouspfcx2miju

LOBO

Juan Echeverrï#!a, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou
2018 Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18  
In this paper, we motivate the need for a generalized evaluation in Twitter bot detection and propose a methodology to evaluate bot classifiers by testing them on unseen bot classes.  ...  Botnets in online social networks are increasingly often affecting the regular flow of discussion, attacking regular users and their posts, spamming them with irrelevant or offensive content, and even  ...  Dataset E consists of spammers of paid apps for mobile devices. Finally, dataset G is made of spammers of products on sale at Amazon.com. Honeypot bots.  ... 
doi:10.1145/3274694.3274738 dblp:conf/acsac/EcheverriaCKLSZ18 fatcat:nso6plpfv5a6bd55mipu6r4c6m

Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

Bin Wu, Le Liu, Yanqing Yang, Kangfeng Zheng, Xiujuan Wang
2020 IEEE Access  
Notably, the increase in the number of mobile devices has contributed to an increase in the frequency of user interaction via online social networks.  ...  digital DNA technique for modeling the behaviors of social network users.  ... 
doi:10.1109/access.2020.2975630 fatcat:t5zu6vrahjaxtnv3hazzrwl364

Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware

Arati Baliga, Jeffrey Bickford, Neil Daswani
2014 Journal of Cyber Security and Mobility  
In this paper, we describe Triton, a new, network-based architecture, and a prototype implementation of it, for detecting and mitigating mobile malware.  ...  The ubiquity of mobile devices and their evolution as computing platforms has made them lucrative targets for malware.  ...  Acknowledgements We thank Tufan Demir, Gerry Eisenhaur and Mike Gagnon for their help with mobile malware analysis.  ... 
doi:10.13052/jcsm2245-1439.324 fatcat:qt22obp6jndpfibojlf4dovcnq
« Previous Showing results 1 — 15 out of 2,419 results