Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Misuse Detection for Information Retrieval Systems Rebecca Cathey, Ling Ma, Nazli Goharian, and David Grossman
 

Summary: Misuse Detection for Information Retrieval Systems
Rebecca Cathey, Ling Ma, Nazli Goharian, and David Grossman
Information Retrieval Laboratory
Department of Computer Science
Illinois Institute of Technology
Chicago, IL 60616
{cathey, maling, goharian, grossman}@ir.iit.edu
ABSTRACT
We present a novel approach to detect misuse within an
information retrieval system by gathering and maintaining
knowledge of the behavior of the user rather than anticipat-
ing attacks by unknown assailants. Our approach is based
on building and maintaining a profile of the behavior of the
system user through tracking, or monitoring of user activity
within the information retrieval system. Any new activ-
ity of the user is compared to the user profile to detect a
potential misuse for the authorized user. We propose four
different methods to detect misuse in information retrieval
systems. Our experimental results on 2 GB collection favor-
ably demonstrate the validity of our approach.

  

Source: Argamon, Shlomo - Department of Computer Science, Illinois Institute of Technology

 

Collections: Computer Technologies and Information Sciences