<node id="653067">
  <nid>653067</nid>
  <type>news</type>
  <uid>
    <user id="32045"><![CDATA[32045]]></user>
  </uid>
  <created>1637594082</created>
  <changed>1637726777</changed>
  <title><![CDATA[Research Finds Models Used to Detect Malicious Users on Popular Social Sites are Vulnerable to Attack]]></title>
  <body><![CDATA[<p>Whether they are fake accounts, sock puppet accounts, spammers, fake news spreaders, vandal editors, or fraudsters, malicious users pose serious challenges to the security of nearly every virtual platform.</p>

<p>Now, research led by Georgia Tech has identified a new threat to deep learning models used to detect malicious users on Facebook and other popular e-commerce, social media, and web platforms.</p>

<p>&ldquo;Social media and web platforms put a lot of energy, effort, and resources into creating state-of-the-art methods to keep their platforms safe,&quot; said&nbsp;Srijan Kumar, School of Computational Science and Engineering assistant professor and co-investigator.</p>

<p>&quot;To do this, they create machine learning and artificial intelligence models that essentially try to identify and separate malicious and at-risk users from the benign users.&rdquo;</p>

<div>
<div>Using a newly developed adversarial attack model, the research team was able to reduce the performance of classification models used to distinguish between benign and malicious users.</div>
</div>

<p>The new attack model generates text posts that mimic a personalized writing style and that are inflected by contextual knowledge of a given target site. The generated posts also are informed by the historical use of a target site and recent topics of interest.</p>

<p>Known&nbsp;as&nbsp;<a href="https://www.cc.gatech.edu/~srijan/pubs/petgen-he-kdd2021.pdf">PETGEN</a>, the&nbsp;work represents&nbsp;the first time researchers have successfully conducted adversarial attacks on deep user sequence classification models.</p>

<p>&ldquo;There is always this game between the models trying to catch the malicious users and the accounts trying to not get caught. If we can act as attackers, we can identify the model vulnerabilities and the potential ways these malicious accounts evade detection systems,&rdquo; Kumar said.</p>

<p>The research&nbsp;was conducted on two real-world datasets from Yelp and Wikipedia. Although&nbsp;the PETGEN research reveals that malicious users can evade these types of detection models, Kumar says he and his team are working now to develop a defense against this type of attack.</p>

<p>&ldquo;The findings will help to pave the path toward the next generation of adversary-aware sequence classification models and better safety for virtual interactions on these platforms,&rdquo; Kumar said.</p>

<p>The findings of this work were first presented at the&nbsp;<a href="https://www.kdd.org/kdd2021/">27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining</a>&nbsp;by Kumar, School of Computer Science Professor&nbsp;Mustaque Ahamad, and computer science Ph.D. student&nbsp;Bing He.</p>

<p>The work presented in PETGEN is also an output of a&nbsp;<a href="https://research.fb.com/blog/2020/07/announcing-the-winners-of-the-2020-request-for-proposals-in-applied-statistics/">Facebook research award</a>&nbsp;that Kumar received jointly with CSE Associate Professor&nbsp;Polo Chau.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2021-11-22T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[A research team led by Georgia Tech has identified a new cyber threats to popular e-commerce, social media, and web platforms.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="633404">
            <nid>633404</nid>
            <type>image</type>
            <title><![CDATA[Srijan Kumar]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>241009</fid>
                  <filename><![CDATA[headshot-Kumar.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/headshot-Kumar.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/headshot-Kumar.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Headshot of Srijan Kumar]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[albert.snedeker@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Albert Snedeker, Communications Manager II<br />
<a href="mailto:albert.snedeker@cc.gatech.edu?subject=Malicious%20users">albert.snedeker@cc.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1188</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1188</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Research Horizons]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
