scispace - formally typeset
Journal ArticleDOI

Blog or block: Detecting blog bots through behavioral biometrics

TLDR
This paper presents a new detection approach by using behavioral biometrics, primarily mouse and keystroke dynamics, to distinguish between human and bot, based on passive monitoring, and demonstrates an overall detection accuracy greater than 99%, with negligible overhead.
About
This article is published in Computer Networks.The article was published on 2013-02-01. It has received 59 citations till now. The article focuses on the topics: Keystroke dynamics & Keystroke logging.

read more

Citations
More filters
Proceedings ArticleDOI

A Survey On Automated Dynamic Malware Analysis Evasion and Counter-Evasion: PC, Mobile, and Web

TL;DR: This paper systematically review i) "fingerprint"-based evasion techniques against automated dynamic malware analysis systems for PC, mobile, and web, ii) evasion detection, iii) evasion mitigation, and iv) offensive and defensive evasion case studies.
Proceedings ArticleDOI

NOMAD: Towards non-intrusive moving-target defense against web bots

TL;DR: A novel, non-intrusive moving-target defense system, NOMAD, to complement existing solutions and prevent web bots from automating web resource access by randomizing HTML elements while not affecting normal users.
Proceedings ArticleDOI

Avatar CAPTCHA: Telling computers and humans apart via face classification

TL;DR: The proposed Avatar CAPTCHA asks users to identify avatar faces from a set of 12 grayscale images comprised of a mix of human and avatar faces to be secure against computer programs (bots).
Journal ArticleDOI

Combating the evasion mechanisms of social bots

TL;DR: This study comprehensively analyzes the evasion mechanisms used by existing social bots and validate those mechanisms by applying three state-of-the-art detection approaches to the collected traces and proposes a new detection approach that incorporates nine newly identified features and two new correlation mechanisms.
Journal ArticleDOI

Overcoming terms of service: a proposal for ethical distributed research

TL;DR: The last two years marked a turning point in access to large-scale social media data for many researchers as mentioned in this paper, as platforms hobbled their APIs and made recording, archiving, and analyzing social data difficult.
References
More filters
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI

The WEKA data mining software: an update

TL;DR: This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.
Book

Analyzing Microarray Gene Expression Data

TL;DR: In this article, the authors proposed a supervised classification of Tissue Samples and linked the supervised classification with survival analysis, and showed that the classification of tissue samples is more accurate than that of microarray data.
Proceedings ArticleDOI

Who is tweeting on Twitter: human, bot, or cyborg?

TL;DR: This paper proposes a classification system that uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot or cyborg on Twitter and demonstrates the efficacy of the proposed classification system.
Proceedings ArticleDOI

Authentication via keystroke dynamics

TL;DR: A database of 42 profiles was constructed based on keystroke patterns gathered from various users performing structured and unstructured tasks, and a toolkit for analyzing system performance under varying criteria is presented.
Related Papers (5)