{"title":"洞察机器学习技术检测异常用户","authors":"P. Kumar, Ajay Kumar, Kakoli Banerjee, Ayush Paharia, Arushi Singh, Anushka Chaudhary","doi":"10.1109/ISCON57294.2023.10112179","DOIUrl":null,"url":null,"abstract":"Anomalous user profile detection is a challenging problem in machine learning. Fake user accounts can be used for malicious activities and can cause extensive damage. This paper reviews the existing literature on user profile detection, categorizing the methods into supervised and unsupervised approaches. It also discusses the challenges and weaknesses of existing approaches and suggests possible areas for improvement. The paper provides a comprehensive overview and proposes a model to classify profiles as real or fake. Social media has made it easier for attackers to steal information and spread malicious content, which makes it important to detect and stop malicious profiles.","PeriodicalId":280183,"journal":{"name":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Insight into Machine Learning Techniques to Detect Anomalous Users\",\"authors\":\"P. Kumar, Ajay Kumar, Kakoli Banerjee, Ayush Paharia, Arushi Singh, Anushka Chaudhary\",\"doi\":\"10.1109/ISCON57294.2023.10112179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Anomalous user profile detection is a challenging problem in machine learning. Fake user accounts can be used for malicious activities and can cause extensive damage. This paper reviews the existing literature on user profile detection, categorizing the methods into supervised and unsupervised approaches. It also discusses the challenges and weaknesses of existing approaches and suggests possible areas for improvement. The paper provides a comprehensive overview and proposes a model to classify profiles as real or fake. Social media has made it easier for attackers to steal information and spread malicious content, which makes it important to detect and stop malicious profiles.\",\"PeriodicalId\":280183,\"journal\":{\"name\":\"2023 6th International Conference on Information Systems and Computer Networks (ISCON)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 6th International Conference on Information Systems and Computer Networks (ISCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCON57294.2023.10112179\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 6th International Conference on Information Systems and Computer Networks (ISCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCON57294.2023.10112179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Insight into Machine Learning Techniques to Detect Anomalous Users
Anomalous user profile detection is a challenging problem in machine learning. Fake user accounts can be used for malicious activities and can cause extensive damage. This paper reviews the existing literature on user profile detection, categorizing the methods into supervised and unsupervised approaches. It also discusses the challenges and weaknesses of existing approaches and suggests possible areas for improvement. The paper provides a comprehensive overview and proposes a model to classify profiles as real or fake. Social media has made it easier for attackers to steal information and spread malicious content, which makes it important to detect and stop malicious profiles.