CS 295 - Seminar on Algorithms for Cyber-Fraud Prevention and Detection

Spring 2009

Michael T. Goodrich
http://www.ics.uci.edu/~goodrich/teach/cs295/
Office hours: MWF 10:00am-10:50am and by appointment

General Course Information

Tentative Set of Topics and External Resources for Presentations

  1. Online Auction Fraud
    1. The Role of Reputation Systems in Reducing On-Line Auction Fraud
    2. Netprobe: a fast and scalable system for fraud detection in online auction networks
    3. A Proposed Data Mining Approach for Internet Auction Fraud Detection
    4. Fraud detection in electronic auction
    5. Detecting fraudulent personalities in networks of online auctioneers
    6. Auctions with untrustworthy bidders
    7. New Algorithms for Mining the Reputation of Participants of Online Auctions
    8. Undesirable and fraudulent behaviour in online auctions
  2. Click Fraud
    1. Click Fraud Resistant Methods for Learning Click-Through Rates
    2. Combating Click Fraud via Premium Clicks
    3. Badvertisements: Stealthy Click-Fraud with Unwitting Accessories
    4. Using association rules for fraud detection in web advertising networks
    5. SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting
    6. On Hit Inflation Techniques and Detection in Streams of Web Advertising Networks
    7. Detectives: detecting coalition hit inflation attacks in advertising networks streams
    8. Addressing Click Fraud in Content Delivery Systems
    9. Pay-per-percentage of impressions: an advertising method that is highly robust to fraud
  3. Credit Fraud, Identity Theft, Information Leaks, Phishing, and Pharming
    1. scalable learning with non-uniform class and cost distributions: A case study in credit card fraud
    2. Distributed data mining in credit card fraud detection
    3. FindOut : Finding Outliers in Very Large Datasets
    4. Adaptive Fraud Detection
    5. Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
    6. Federated Identity Management
    7. A Model for Delimited Information Release
    8. Web wallet: preventing phishing attacks by revealing user intentions
    9. Phoolproof Phishing Prevention
    10. Learning to detect phishing emails
    11. Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
    12. Drive-By Pharming
    13. Dynamic pharming attacks and locked same-origin policies for web browsers
  4. Social network security and privacy
    1. SybilGuard: defending against sybil attacks via social networks
    2. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
    3. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
    4. Preserving Privacy in Social Networks Against Neighborhood Attacks
    5. Trust Transfer: Encouraging Self-recommendations Without Sybil Attack

Copyright © 2009 Michael T. Goodrich, as to all lectures and course content. Students are prohibited from recording the audio or video content of lectures and from selling (or being paid for taking) notes during this course to or by any person or commercial firm without the express written permission of the professor teaching this course.