• Title/Summary/Keyword: review spam

Search Result 13, Processing Time 0.019 seconds

Performance Evaluation of Review Spam Detection for a Domestic Shopping Site Application (국내 쇼핑 사이트 적용을 위한 리뷰 스팸 탐지 방법의 성능 평가)

  • Park, Jihyun;Kim, Chong-kwon
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.339-343
    • /
    • 2017
  • As the number of customers who write fake reviews is increasing, online shopping sites have difficulty in providing reliable reviews. Fake reviews are called review spam, and they are written to promote or defame the product. They directly affect sales volume of the product; therefore, it is important to detect review spam. Review spam detection methods suggested in prior researches were only based on an international site even though review spam is a widespread problem in domestic shopping sites. In this paper, we have presented new review features of the domestic shopping site NAVER, and we have applied the formerly introduced method to this site for performing an evaluation.

Finding Rotten Eggs: A Review Spam Detection Model using Diverse Feature Sets

  • Akram, Abubakker Usman;Khan, Hikmat Ullah;Iqbal, Saqib;Iqbal, Tassawar;Munir, Ehsan Ullah;Shafi, Dr. Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5120-5142
    • /
    • 2018
  • Social media enables customers to share their views, opinions and experiences as product reviews. These product reviews facilitate customers in buying quality products. Due to the significance of online reviews, fake reviews, commonly known as spam reviews are generated to mislead the potential customers in decision-making. To cater this issue, review spam detection has become an active research area. Existing studies carried out for review spam detection have exploited feature engineering approach; however limited number of features are considered. This paper proposes a Feature-Centric Model for Review Spam Detection (FMRSD) to detect spam reviews. The proposed model examines a wide range of feature sets including ratings, sentiments, content, and users. The experimentation reveals that the proposed technique outperforms the baseline and provides better results.

A Crowdsourcing-Based Paraphrased Opinion Spam Dataset and Its Implication on Detection Performance (크라우드소싱 기반 문장재구성 방법을 통한 의견 스팸 데이터셋 구축 및 평가)

  • Lee, Seongwoon;Kim, Seongsoon;Park, Donghyeon;Kang, Jaewoo
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.338-343
    • /
    • 2016
  • Today, opinion reviews on the Web are often used as a means of information exchange. As the importance of opinion reviews continues to grow, the number of issues for opinion spam also increases. Even though many research studies on detecting spam reviews have been conducted, some limitations of gold-standard datasets hinder research. Therefore, we introduce a new dataset called "Paraphrased Opinion Spam (POS)" that contains a new type of review spam that imitates truthful reviews. We have noticed that spammers refer to existing truthful reviews to fabricate spam reviews. To create such a seemingly truthful review spam dataset, we asked task participants to paraphrase truthful reviews to create a new deceptive review. The experiment results show that classifying our POS dataset is more difficult than classifying the existing spam datasets since the reviews in our dataset more linguistically look like truthful reviews. Also, training volume has been found to be an important factor for classification model performance.

A Study on the Effective Countermeasure of SPAM : Focused on Policy Suggestion (불법스팸 방지를 위한 개선방안 : 정책적 제안을 중심으로)

  • Sohn, Jong-Mo;Lim, Hyo-Chang
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2021
  • Today, people share information and communicate with others using various information and communication media such as e-mail, smartphones, SNS, etc. However, it is being used in malicious attacks to send a large amount of illegal spam or to use it for fraud by using illegally collected personal information and devices that are vulnerable to security. Illegal spam, smishing, and fraudulent mail(SCAM) cause a lot of direct and indirect damage to companies and users, including not only social costs such as mental fatigue, but also unnecessary consumption of IT infrastructure resources and economic losses. Although there are regulations related to spam, violators of the law are still on the rise by circumventing the law, and victims are constantly occurring, so it is necessary to review what the problem is. This study examined domestic and foreign spam-related regulations and spam-related response activities, identified problems, and suggested improvement countermeasures. Through this study, it was intended to suggest directions for improving spam-related systems in order to block illegal spam and prevent fraudulent damage.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Incremental SVM for Online Product Review Spam Detection (온라인 제품 리뷰 스팸 판별을 위한 점증적 SVM)

  • Ji, Chengzhang;Zhang, Jinhong;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.89-93
    • /
    • 2014
  • Reviews are very important for potential consumer' making choices. They are also used by manufacturers to find problems of their products and to collect competitors' business information. But someone write fake reviews to mislead readers to make wrong choices. Therefore detecting fake reviews is an important problem for the E-commerce sites. Support Vector Machines (SVMs) are very important text classification algorithms with excellent performance. In this paper, we propose a new incremental algorithm based on weight and the extension of Karush-Kuhn-Tucker(KKT) conditions and Convex Hull for online Review Spam Detection. Finally, we analyze its performance in theory.

  • PDF

A study on mobile phone addiction of college students (D-College) (대학생의 휴대폰 중독에 관한 연구(D 대학중심))

  • Lee, Jae-Do
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.159-167
    • /
    • 2007
  • This study executed questionnaire surveys on 482 undergraduates of D-college to review the extents of spam letter messages received through the mobile phones of college students and the extents of their addiction to mobile phones. It was revealed that each college student received one or two spam letter messages on average a day. Among the received spam messages were the messages containing the contents of commodity advertisements most frequent and the surveys indicated that spam messages are hardly read. As for the addiction to mobile phones, the average score of addiction of the respondents was indicated to be 38.73 based on the full score of 100 and the number of the ones with the scores of 60 or more was 47 which is 9.75% and the ones with the scores of 70 or more was 13 which is 2.70%. Also the younger the students were, the higher were the numbers of the students included in the addictive group and the number of students from other areas included in the addictive group was high and the number of the students in 2years system included in the addictive group was higher than the number of the students in 3years system included in the addictive group.

  • PDF

Survey on Fake Review Detection of E-commerce Sites (전자 상거래 사이트의 가짜 리뷰 판별 기법 조사)

  • Ji, Chengzhang;Zhang, Jinhong;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.79-81
    • /
    • 2014
  • People increasingly rely on sources of information from E-commerce reviews. Product reviews is an important determinant of potential customers' buying choices. They are also utilized by product manufacturers to find problems of their products and to collect competitive intelligence information about their competitors. Unfortunately, it is well-known that many online product reviews are not made by genuine costumers of products. Reviewers could write some undeserving positive reviews to promote or fake negative reviews to defame some certain product, and we call them fake product reviews. Fake product review detection makes an attempt to detect fake reviews and removes them to restore the truthful ones for readers. To the best of our knowledge, there is still less published study on this problem. In this paper, we make a survey and an attempt to give a brief overview on fake product review detection. The related work of fake product review detection is presented including web spam and spam email. Then some methods to detect fake reviews are introduced and summarized. The trend of fake product review detection is concluded finally.

  • PDF

ITU-T 스팸 대응 기술 국제표준화 동향

  • Park, So-Young;Kang, Shin-Gak
    • Review of KIISC
    • /
    • v.21 no.2
    • /
    • pp.47-52
    • /
    • 2011
  • 본 고는 ITU-T SG17 Q.5 "Countering spam by technical means"에서의 스팸 대응 기술 표준화 현황을 정리한다. Q.5/17에서의 스팸차단기술 표준화는 주로 이메일 스팸, IP 멀티미디어 스팸, 모바일 단문메시지서비스 스팸을 대상으로하며, 스팸 차단을 위한 상위 수준의 개요 표준, 기술 프레임워크 표준 및 기술 기법에 대한 표준 개발이 이루어지고 있다.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.