An automatic and proactive identity theft detection model in MMORPGs
نویسندگان
چکیده
Identity theft happens frequently, especially in popular multiplayer games where cyberassets can be monetized. In this work, we propose an automatic and proactive identity theft detection model in online games. We specify the identity theft process into exploration, monetization, and theft and pose identity theft detection as a multi-class classification problem. We propose an automatic and proactive detection model utilizing rich features, along with appropriate problem-specific domain knowledge regarding the unique properties of identity theft. The proposed model based on process specification and automatic learning will reduce financial losses to game users and game companies through early detection.
منابع مشابه
AN-EUL method for automatic interpretation of potential field data in unexploded ordnances (UXO) detection
We have applied an automatic interpretation method of potential data called AN-EUL in unexploded ordnance (UXO) prospective which is indeed a combination of the analytic signal and the Euler deconvolution approaches. The method can be applied for both magnetic and gravity data as well for gradient surveys based upon the concept of the structural index (SI) of a potential anomaly which is relate...
متن کاملDetecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes
With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...
متن کاملAn introduction to the examples of scientific plagiarism and its identification soft-wares
Background: Increasing Immorality and Plagiarism in the country's higher education system has become a serious crisis. Hence, the purpose of this study was to analyze the Examples of Plagiarism and the introduction of Plagiarism detection software. Method: The present study is a narrative review study. Articles in Persian and Latin related to the use of scientific theft key words in databases w...
متن کاملThe Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students
Background. Today, online shopping has become one of the most important components of modern marketing that had both positive and negative consequences for customers. Objectives. The purpose of present research was to study the consequences of fear of identity theft in sport products online shopping from the perspective of physical education students. Methods. The present study is a descripti...
متن کاملDimensionality Reduction and Improving the Performance of Automatic Modulation Classification using Genetic Programming (RESEARCH NOTE)
This paper shows how we can make advantage of using genetic programming in selection of suitable features for automatic modulation recognition. Automatic modulation recognition is one of the essential components of modern receivers. In this regard, selection of suitable features may significantly affect the performance of the process. Simulations were conducted with 5db and 10db SNRs. Test and ...
متن کامل