CFP last date
20 December 2024
Reseach Article

User’s Verification to Prevent Malicious Access in Web-based Forums

by Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 9
Year of Publication: 2013
Authors: Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff
10.5120/10493-5250

Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff . User’s Verification to Prevent Malicious Access in Web-based Forums. International Journal of Computer Applications. 63, 9 ( February 2013), 11-16. DOI=10.5120/10493-5250

@article{ 10.5120/10493-5250,
author = { Mahdi Taheri Tabar, Imran Ghani, Mohd Shafie Abd Latiff },
title = { User’s Verification to Prevent Malicious Access in Web-based Forums },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 9 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number9/10493-5250/ },
doi = { 10.5120/10493-5250 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:51.616476+05:30
%A Mahdi Taheri Tabar
%A Imran Ghani
%A Mohd Shafie Abd Latiff
%T User’s Verification to Prevent Malicious Access in Web-based Forums
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 9
%P 11-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper aims to address the issue of malicious accounts that are created and used to imitate real users in web-based forums. In fact, form bots are used to create fake users on forums for several purposes. As a result hundreds of fake users start appearing in the forums and normally placing spam URLs. For forum administrators/managers/moderators, it is a frustrating job to keep members' list clean. In order to overcome this issue, a novel approach is proposed that would be useful in order to prevent malicious users' access and decrease rate of deception in web-based forums. We present a comparison between the proposed approach and IDology approach. The results illustrate that our proposed approach addresses the issue more efficiently as compared with IDology approach.

References
  1. Wang, Y. , Tan, T. , & K. Jain, A. (2003). Combining Face and Iris Biometrics for Identity Verification. Combining Face and Iris Biometrics for Identity Verification. to appear on Proc. AVBPA 2003.
  2. Trufina. (2011). Retrieved from www. trufina. com: http://www. trufina. com/help new/background_verification. php
  3. Sanderson, C. , & K. Paliwal, K. (2001). Robust Face Based Identity Verification. MICROELECTRONIC ENGINEERING RESEARCH CONFERENCE.
  4. Privaris. (2007). Achieving Universal Secure Identity Verification with. Virginia: Privaris.
  5. Schejbal, J. (2010). Building an authentication system under strict real-world constraints.
  6. Netidme. (n. d. ). Age and Identity Verification Services. East Kilbride,United Kingdom: Netidme.
  7. Mercuri, M. (2007). Beginning Information Cards and CardSpace: From Novice to Professional. Apress.
  8. Kimsal, M. (2007). Intro to OpenID. TriPUG.
  9. IOCS. Ltd. (2011). Electronic Identity Verification for E-Approval. London: IOCS. Ltd
  10. Gupta, J. (2007, January 29). Retrieved from www. readwriteweb. com: http://www. readwriteweb. com/archives/nobody_knows_youre_a_dog. php
  11. Weiss, T. R. (2002, December 10). Retrieved from http://www. computerworld. com: http://www. computerworld. com/s/article/76558/VeriSign_unveils_new_online_identity_verification_services
  12. Waters, J. K. (2012). Retrieved from csoonline: http://www. csoonline. com/article/205053/the-abcs-of-identity-management
  13. Acunetix Corporation. (2012, December 1). Home page. Retrieved December 1, 2012, from Acunetix Corporation Web site: http://www. acunetix. com/
  14. BBC NEWS. (2011, November 24). Technology. Retrieved December 2, 2012, from BBC NEWS: http://www. bbc. co. uk/news/technology-15869683
  15. Hindocha, N. , & Chien, E. (2003). Malicious Threats and Vulnerabilities. Cupertino: Symantec.
  16. IDology. (2009, July 21). Press-Release. Retrieved November 5, 2012, from IDology Corporation Web site: http://www. idology. com/press-release/idology-approved-as-identity-and-age-verification-provider-for-state-of-kansas.
  17. Moore, T. , & Anderson, R. (2011). Economics and Internet Security: a Survey of Recent Analytical, Empirical and Behavioral Research. Massachusetts: Harvard University.
  18. Rabkin, A. (2008). Personal knowledge questions for fallback authentication:Security questions in the era of Facebook. Pittsburgh: Symposium on Usable Privacy and Security.
Index Terms

Computer Science
Information Sciences

Keywords

Identity theft verification service identity management malicious users forums