Rogue people: on adversarial crowdsourcing in the context of cyber security

Mohammad Moradi, Qi Li
{"title":"Rogue people: on adversarial crowdsourcing in the context of cyber security","authors":"Mohammad Moradi, Qi Li","doi":"10.1108/jices-08-2019-0100","DOIUrl":null,"url":null,"abstract":"\nPurpose\nOver the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.\n\n\nDesign/methodology/approach\nTo delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.\n\n\nFindings\nDespite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.\n\n\nOriginality/value\nTo the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.\n","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Inf. Commun. Ethics Soc.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/jices-08-2019-0100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects. Design/methodology/approach To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced. Findings Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats. Originality/value To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.
流氓:网络安全背景下的对抗性众包
在过去的十年中,不同学科的许多研究工作都受益于无穷无尽的人群和他们的潜力(以众包的形式)作为有效的问题解决策略和计算模型。但是没有什么有趣的东西是完全片面的。因此,当涉及到利用人们的力量时,作为众包的阴暗面,有一些可能的威胁没有被考虑到,比如招募黑帽众包工人来组织有针对性的敌对意图。本文的目的是通过对这一关键问题的不同方面的调查,引起人们对这一关键问题的更多关注。设计/方法/途径为了深入研究这种恶意意图的细节,我们研究了相关文献和以往的研究。然后,对抗性众包攻击的四种主要类型以及一些现实场景进行了讨论和描述。最后,介绍了未来可能面临的威胁。尽管有许多关于对抗性众包的研究,但只有少数专门的研究致力于在网络安全的背景下考虑这个问题。在这方面,针对此类人为攻击提出的类型学(和解决的场景)可以为识别和应对此类威胁的方式提供启示。原创性/价值据作者所知,这是第一部对名义上的主题进行详细调查的作品。由于在广泛的应用领域中利用人群的智慧和努力的普及和效率,很可能对抗性的人为驱动的意图获得更多的关注。在这方面,预计本研究可以作为提出防御机制的路线图,以应对这种多样化的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信