Research Article

User’s Verification to Prevent Malicious Access in Web-based Forums

by  Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Issue 9
Published: February 2013
Authors: Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff
10.5120/10493-5250
PDF

Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff . User’s Verification to Prevent Malicious Access in Web-based Forums. International Journal of Computer Applications. 63, 9 (February 2013), 11-16. DOI=10.5120/10493-5250

                        @article{ 10.5120/10493-5250,
                        author  = { Mahdi Taheri Tabar,Imran Ghani,Mohd Shafie Abd Latiff },
                        title   = { User’s Verification to Prevent Malicious Access in Web-based Forums },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 63 },
                        number  = { 9 },
                        pages   = { 11-16 },
                        doi     = { 10.5120/10493-5250 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Mahdi Taheri Tabar
                        %A Imran Ghani
                        %A Mohd Shafie Abd Latiff
                        %T User’s Verification to Prevent Malicious Access in Web-based Forums%T 
                        %J International Journal of Computer Applications
                        %V 63
                        %N 9
                        %P 11-16
                        %R 10.5120/10493-5250
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper aims to address the issue of malicious accounts that are created and used to imitate real users in web-based forums. In fact, form bots are used to create fake users on forums for several purposes. As a result hundreds of fake users start appearing in the forums and normally placing spam URLs. For forum administrators/managers/moderators, it is a frustrating job to keep members' list clean. In order to overcome this issue, a novel approach is proposed that would be useful in order to prevent malicious users' access and decrease rate of deception in web-based forums. We present a comparison between the proposed approach and IDology approach. The results illustrate that our proposed approach addresses the issue more efficiently as compared with IDology approach.

References
  • Wang, Y. , Tan, T. , & K. Jain, A. (2003). Combining Face and Iris Biometrics for Identity Verification. Combining Face and Iris Biometrics for Identity Verification. to appear on Proc. AVBPA 2003.
  • Trufina. (2011). Retrieved from www. trufina. com: http://www. trufina. com/help new/background_verification. php
  • Sanderson, C. , & K. Paliwal, K. (2001). Robust Face Based Identity Verification. MICROELECTRONIC ENGINEERING RESEARCH CONFERENCE.
  • Privaris. (2007). Achieving Universal Secure Identity Verification with. Virginia: Privaris.
  • Schejbal, J. (2010). Building an authentication system under strict real-world constraints.
  • Netidme. (n. d. ). Age and Identity Verification Services. East Kilbride,United Kingdom: Netidme.
  • Mercuri, M. (2007). Beginning Information Cards and CardSpace: From Novice to Professional. Apress.
  • Kimsal, M. (2007). Intro to OpenID. TriPUG.
  • IOCS. Ltd. (2011). Electronic Identity Verification for E-Approval. London: IOCS. Ltd
  • Gupta, J. (2007, January 29). Retrieved from www. readwriteweb. com: http://www. readwriteweb. com/archives/nobody_knows_youre_a_dog. php
  • Weiss, T. R. (2002, December 10). Retrieved from http://www. computerworld. com: http://www. computerworld. com/s/article/76558/VeriSign_unveils_new_online_identity_verification_services
  • Waters, J. K. (2012). Retrieved from csoonline: http://www. csoonline. com/article/205053/the-abcs-of-identity-management
  • Acunetix Corporation. (2012, December 1). Home page. Retrieved December 1, 2012, from Acunetix Corporation Web site: http://www. acunetix. com/
  • BBC NEWS. (2011, November 24). Technology. Retrieved December 2, 2012, from BBC NEWS: http://www. bbc. co. uk/news/technology-15869683
  • Hindocha, N. , & Chien, E. (2003). Malicious Threats and Vulnerabilities. Cupertino: Symantec.
  • IDology. (2009, July 21). Press-Release. Retrieved November 5, 2012, from IDology Corporation Web site: http://www. idology. com/press-release/idology-approved-as-identity-and-age-verification-provider-for-state-of-kansas.
  • Moore, T. , & Anderson, R. (2011). Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research. Massachusetts: Harvard University.
  • Rabkin, A. (2008). Personal knowledge questions for fallback authentication:Security questions in the era of Facebook. Pittsburgh: Symposium on Usable Privacy and Security.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Identity theft verification service identity management malicious users forums

Powered by PhDFocusTM